Documentation
Full plugin documentation and usage guide
Binary Reverse Engineering Plugin
Agentic workflow for reverse engineering ELF binaries from embedded devices using radare2, Ghidra, GDB, and QEMU.
Installation
/plugin install binary-re@2389-research
What This Plugin Provides
Skills
- binary-re - Structured RE workflow with hypothesis-driven analysis
Capabilities
- Cross-architecture static analysis (ARM64, ARMv7, x86_64, MIPS)
- Dynamic tracing via QEMU user-mode emulation
- GDB integration for fine-grained debugging
- Ghidra headless decompilation
- Human-in-the-loop for risky operations
Quick Example
User: "Analyze this binary from an IoT device - ARM, Linux-based"Claude: [Triggers binary-re skill]
Let me start with triage to understand what we're working with.
Phase 1: Initial Triage
┌─────────────────────────────────────────┐
│ Architecture: ARM 32-bit LE (v7) │
│ Libc: musl 1.2.3 │
│ Dependencies: libcurl, libssl, libz │
│ Stripped: Yes │
│ Strings: 847 (including URLs, paths) │
└─────────────────────────────────────────┘
FACTS recorded:
- Links against libcurl.so.4 (network client)
- Contains string "api.vendor.com/telemetry"
- Imports socket, connect, SSL_read functions
HYPOTHESIS: This is a telemetry client that phones home over HTTPS
Confidence: 0.7
Evidence: curl+ssl imports, telemetry URL string
Do you want me to proceed with static analysis of network-related
functions, or should we try dynamic analysis under QEMU first?
Tool Requirements
# Required
sudo apt install radare2 qemu-user gdb-multiarch
Recommended
Ghidra from https://ghidra-sre.org/
pip install frida-tools
ARM sysroots
sudo apt install libc6-armhf-cross libc6-arm64-cross
Use Cases
- Firmware Analysis - Understand device behavior without source
- Protocol Reverse Engineering - Map network communications
- Security Research - Find vulnerabilities in embedded systems
- Hardware Hacking - Analyze robot/IoT device internals
Philosophy
The LLM drives analysis; the human provides context.
You tell Claude:
- What platform/device the binary came from
- What hardware/chips are involved
- What the binary is theorized to do
- Any constraints (no network, isolated test env)
Claude executes:
- Tool invocations with structured output
- Hypothesis formation from evidence
- Experiment design to test theories
- Synthesis into actionable knowledge
Human-in-the-Loop
The skill asks for confirmation before:
- Executing binaries (even sandboxed)
- Network-capable dynamic analysis
- Operations requiring device access
- Major changes in analysis direction
Documentation
- CLAUDE.md - Detailed skill reference
- skills/SKILL.md - Full workflow documentation
License
MIT
Quick Install
Get started in seconds
/plugin marketplace add 2389-research/claude-plugins
/plugin install binary-re
Skills auto-trigger when relevant